Case Studies
Case Studies
Case Studies
1. Case: Mphasis BPO Fraud: 2005In December 2004, four call centre employees, working at an
outsourcing facility operated by MphasiS in India, obtained PIN codes from four customers of
MphasiS’ client, Citi Group. These employees were not authorized to obtain the PINs. In
association with others, the call centre employees opened new accounts at Indian banks using
false identities. Within two months, they used the PINs and account information gleaned during
their employment at MphasiS to transfer money from the bank accounts of CitiGroup customers
to the new accounts at Indian banks.
By April 2005, the Indian police had tipped off to the scam by a U.S. bank, and quickly identified
the individuals involved in the scam. Arrests were made when those individuals attempted to
withdraw cash from the falsified accounts, $426,000 was stolen; the amount recovered was
$230,000.
Verdict: Court held that Section 43(a) was applicable here due to the nature of unauthorized
access involved to commit transactions.
2. Case: Syed Asifuddin and Ors. Vs. The State of Andhra Pradesh In this case, Tata Indicom
employees were arrested for manipulation of the electronic 32- bit number (ESN) programmed
into cell phones theft were exclusively franchised to Reliance Infocomm.
Verdict: Court held that tampering with source code invokes Section 65 of the Information
Technology Act.
3. Case: Kumar v/s Whiteley In this case the accused gained unauthorized access to the Joint
Academic Network (JANET) and deleted, added files and changed the passwords to deny access
to the authorized users.Investigations had revealed that Kumar was logging on to the BSNL
broadband Internet connection as if he was the authorized genuine user and ‘made alteration in
the computer database pertaining to broadband Internet user accounts’ of
the subscribers.The CBI had registered a cyber crime case against Kumar and carried out
investigations on the basis of a complaint by the Press Information Bureau, Chennai, which
detected the unauthorised use of broadband Internet. The complaint also stated that the
subscribers had incurred a loss of Rs 38,248 due to Kumar’s wrongful act. He used to ‘ hack’ sites
from Bangalore, Chennai and other cities too, they said.
Verdict: The Additional Chief Metropolitan Magistrate, Egmore, Chennai, sentenced N G Arun
Kumar, the techie from Bangalore to undergo a rigorous imprisonment for one year with a fine
of Rs 5,000 under section 420 IPC (cheating) and Section 66 of IT Act (Computer related
Offense).
Case #2: Bomb Hoax mail In 2009, a 15-year-old Bangalore teenager was arrested by the cyber
crime investigation cell (CCIC) of the city crime branch for allegedly sending a hoax e-mail to a
private news channel. In the e-mail, he claimed to have planted five bombs in Mumbai,
challenging the police to find them before it was too late. At around 1p.m. on May 25, the news
channel received an e-mail that read: “I have planted five bombs in Mumbai; you have two hours
to find it.” The police, who were alerted immediately, traced the Internet Protocol (IP) address to
Vijay Nagar in Bangalore. The Internet service provider for the account was BSNL, said officials.
Section 66A – Punishment for sending offensive messages through communication service
5.
Case#1: The CEO of an identity theft protection company, Lifelock, Todd Davis’s social security
number was exposed by Matt Lauer on NBC’s Today Show. Davis’ identity was used to obtain a
$500 cash advance loan.
Case#2 Li Ming, a graduate student at West Chester University of Pennsylvania faked his own
death, complete with a forged obituary in his local paper. Nine months later, Li attempted to
obtain a new driver’s license with the intention of applying for new credit cards
eventually.Section 66C – Punishment for identity theft
6.
Case: Sandeep Vaghese v/s State of Kerala
A complaint filed by the representative of a Company, which was engaged in the business of
trading and distribution of petrochemicals in India and overseas, a crime was registered against
nine persons, alleging offenses under Sections 65, 66, 66A, C and D of the Information
Technology Act along with Sections 419 and 420 of the Indian Penal Code.
The company has a web-site in the name and and style `www.jaypolychem.com’ but, another
web site `www.jayplychem.org’ was set up in the internet by first accused Samdeep Varghese @
Sam, (who was dismissed from the company) in conspiracy with other accused, including Preeti
and Charanjeet Singh, who are the sister and brother-in-law of `Sam’
Defamatory and malicious matters about the company and its directors were made available in
that website. The accused sister and brother-in-law were based in Cochin and they had been
acting in collusion known and unknown persons, who have collectively cheated the compan y and
committed acts of forgery, impersonation etc.
Two of the accused, Amardeep Singh and Rahul had visited Delhi and Cochin. The first accused
and others sent e-mails from fake e-mail accounts of many of the customers, suppliers, Bank etc.
to malign the name and image of the Company and its Directors. The defamation campaign run
by all the said persons named above has caused immense damage to the name and reputation
of the Company.
The Company suffered losses of several crores of Rupees from producers, suppliers and
customers and were unable to do business.
7.
Cases: Jawaharlal Nehru University MMS scandal In a severe shock to the prestigious and
renowned institute – Jawaharlal Nehru University, a pornographic MMS clip was apparently
made in the campus and transmitted outside the university.Some media reports claimed that the
two accused students initially tried to extort money from the girl in the video but when they
failed the culprits put the video out on mobile phones, on the internet and even sold it as a CD in
the blue film market.
Nagpur Congress leader’s son MMS scandal On January 05, 2012 Nagpur Police arrested two
engineering students, one of them a son of a Congress leader, for harassing a 16-year-old girl by
circulating an MMS clip of their sexual acts. According to the Nagpur (rural) police, the girl was in
a relationship with Mithilesh Gajbhiye, 19, son of Yashodha Dhanraj Gajbhiye, a zila parishad
member and an influential Congress leader of Saoner region in Nagpur district.
8.
Case: The Mumbai police have registered a case of ‘cyber terrorism’—the first in the state since
an amendment to the Information Technology Act—where a threat email was sent to the BSE
and NSE on Monday. The MRA Marg police and the Cyber Crime Investigation Cell are jointly
probing the case. The suspect has been detained in this case.The police said an email challenging
the security agencies to prevent a terror attack was sent by one Shahab Md with an ID
sh.itaiyeb125@yahoo.in to BSE’s administrative email ID corp.relations@bseindia.com at around
10.44 am on Monday.The IP address of the sender has been traced to Patna in Bihar. The ISP is
Sify. The email ID was created just four minutes before the email was sent. “The sender had,
while creating the new ID, given two mobile numbers in the personal details column. Both the
numbers belong to a photo frame-maker in Patna,’’ said an officer.
Status: The MRA Marg police have registered forgery for purpose of cheating, criminal
intimidation cases under the IPC and a cyber-terrorism case under the IT Act.
9.
Case: This case is about posting obscene, defamatory and annoying message about a divorcee
woman in the Yahoo message group. E-mails were forwarded to the victim for information by
the accused through a false e- mail account opened by him in the name of the victim. These
postings resulted in annoying phone calls to the lady. Based on the lady’s complaint, the police
nabbed the accused. Investigation revealed that he was a known family friend of the victim and
was interested in marrying her. She was married to another person, but that marriage ended in
divorce and the accused started contacting her once again. On her reluctance to marry him he
started harassing her through internet.
Verdict: The accused was found guilty of offences under section 469, 509 IPC and 67 of IT Act
2000. He is convicted and sentenced for the offence as follows:
As per 469 of IPC he has to undergo rigorous imprisonment for 2 years and to pay fine
of Rs.500/-
As per 509 of IPC he is to undergo to undergo 1 year Simple imprisonment and to pay Rs 500/-
As per Section 67 of IT Act 2000, he has to undergo for 2 years and to pay fine of Rs.4000/-
10.
Case: Janhit Manch & Ors. v. The Union of India 10.03.2010 Public Interest Litigation: The
petition sought a blanket ban on pornographic websites. The NGO had argued that websites
displaying sexually explicit content had an adverse influence, leading youth on a delinquent path.
Section 67B – Punishment for publishing or transmitting of material depicting children in sexually
explicit act, etc. in electronic form
Writer A has included a word-for-word passage from his/her source without any indication that it
is a direct quotation.
Writer A has included a verbatim passage from his/her source and has failed to indicate it's a
direct quotation.
13. Hi Standard Tech Training Ltd. is a Mumbai based organisation which is expanding its office set-
up to Chennai. At Chennai office compound, they are planning to have 3 different blocks for
Admin, Training and Accounts related activities. Each block has a number of computers, which
are required to be connected in a network for communication, data and resource sharing.
As a network consultant, you have to suggest the best network related solutions for them for
issues/problems raised by them in (i) to (iv), as per the distances between various
blocks/locations and other given parameters.
1. Suggest the most appropriate block/location to house the SERVER in the CHENNAI
office (out of the 3 blocks) to get the best and effective connectivity. Justify your
answer.
2. Suggest the best wired medium and draw the cable layout (Block to Block) to
efficiently connect various blocks within the CHENNAI office compound.
3. Suggest a device/software and its placement that would provide data security for
the entire network of the CHENNAI office.
4. Suggest a device and the protocol that shall be needed to provide wireless Internet
access to all smartphone/laptop users in the CHENNAI office
Аnswer:
( i) Training Block is the most appropriate block/location to house the SERVER in the CHENNAI
office to get the best and effective connectivity because it has maximum number of computers.
( iii) Suggested device is firewall. And it will be placed where all messages are entering or leaving
the entire network of the CHENNAI office.
( iv) Device: WiFi card
Protocol: TCP/IP
14. Uplifting Skills Hub India is a knowledge and skill community which has an aim to uplift the
standard of knowledge and skills in the society. It is planning to set-up its training centers in
multiple towns and villages pan India with its head offices in the nearest cities. They have
created a model of their network with a city, a town and 3 villages as follows. As a network
consultant, you have to suggest the best network related solutions for their issues/problems
raised in (i) to (iv) keeping in mind the distances between various locations and other given
parameters.
NOTE : In Villages, there are community centers, in which one room has been given as training
center to this organisation to install computers.
The organisation has got financial support from the government and top IT companies.
1. Suggest the most appropriate location of the SERVER in the B_HUB (out of the 4
locations), to get the best and effective connectivity. Justify your answer.
2. Suggest the best wired medium and draw the cable layout (location to location) to
efficiently connect various location within the B_HUB.
3. Which hardware device will you suggest to connect all the computers within each
location of B_HUB?
4. Which service/protocol will be most helpful to conduct live interactions of Experts
from Head Office and people at all locations of B_HUB? Delhi 2016
Аnswer:
( i) B_TOWN is the most appropriate location of the server inside the B_HUB because it has
maximum number of computers.
Ethernet cable is the best wired medium to connect the various locations within the B HUB.
( iii) Switch
( iv) Telnet
15. Perfect Edu Services Ltd. is an educational organisation. It is planning to set-up its India campus
at Chennai-with its head office at Delhi. The chennai campus has 4 main buildings-ADMIN,
ENGINEERING, BUSINESS and MEDIA.
You as a network expert have to suggest the best network related solutions for their problems
raised in
(i) to (iv), keeping in mind the distance between the buildings and other given parameters .
1. Suggest the most appropriate location of the server inside the CHENNAI campus
(oof the 4 buildings), to get the best connectivity for maximum number of
computers. Justify your answer.
2. Suggest and draw the cable layout to efficiently connect various buildings within
the CHENNAI campus for connecting the computers.
3. Which hardware device will you suggest to be procured by the company to be
installed to protect and control the Internet uses within the campus?
4. Which of the following will you suggest to establish the online face-to-face
communication between the people in the Admin Office of CHENNAI campus and
DELHI Head Office?
(a) Cable TV
(b) E-mail
(c) Video Conferencing
(d) Text Chat Delhi 2018
Аnswer:
( i) ADMIN is the most appropriate location of the server inside the CHENNAI campus because it
has maximum number of computers.
( iii) Firewall
( iv) (c) Video Conferencing
16. Trine Tech Corporation (TTC) is a professional consultancy company. The company is planning to
set-up their new offices in India with its hub at .Hyderabad. As a network adviser, you have to
understand their requirement and suggest them the best available solutions. Their queries are
mentioned as (i) to (iv) below.
Physical locations of the blocks of TTC
1. What will the most appropriate block, where TTC should plan to install their
server?
2. Draw a block to block cable layout to connect all the buildings in the most
appropriate manner for efficient
communication.
3. What will be the best possible connectivity out of the following, you will suggest to
connect the new set-up of offices in Bangalore with its London based office.
• Satellite Link
• Infrared
• Ethernet
4. Which of the following device will be suggested by you to connect each computer
in each of the buildings?
• Switch
• Modem
• Gateway Delhi 2014
Аnswer:
( i) TTC should install its server in Finance Block because it has maximum number of computers.
17. G.R.K International Inc. is planning to connect its Bengaluru Office Setup with its Head Office in
Delhi. The Bengaluru Office G.R.K. International Inc. is spread across an area of approx. 1 square
kilometres consisting of 3 blocks.
Human Resources, Academics and Administration. You as network expert have to suggest
answers to the four queries (i) to (iv) raised by them.
1. Suggest the most suitable block in the Bengaluru Office Setup, to host the server.
Give a suitable reason with your suggestion.
2. Suggest the cable layout among the various blocks within the Bengaluru Office
Setup for connecting the blocks.
3. Suggest a suitable networking device to be installed in each of the blocks
essentially required for connecting computers inside the blocks with fast and
efficient connectivity.
4. Suggest the most suitable media to provide secure, fast and reliable data
connectivity between Delhi Head Office and the Bengaluru Office Setup.
Аnswer:
( i) Human Resources, because it has maximum number of computers.
( iii) Hub/Switch
( iv) Satellites
18. Expertia Professional Global (EPG) in an online corporate training provider company for IT
related courses. The company is setting up their new campus in Mumbai. You as a network
expert have to study the physical locations of various buildings and the numb er of computers to
be installed. In the planning phase, provide the best possible answers for the queries (i) t o
(iv) raised by them.
Physical Locations of the buildings of EPG
19. Expertia Professional Global (EPG) in an online corporate training provider company for IT
related courses. The company is setting up their new campus in Mumbai. You as a network
expert have to study the physical locations of various buildings and the number of computers to
be installed. In the planning phase, provide the best possible answers for the queries (i) to
(iv) raised by them.
Physical Locations of the buildings of EPG
1. Suggest the most appropriate building, where EPG should plan to install the server.
2. Suggest the most appropriate building to building cable layout to connect all three
buildings for efficient communication.
3. Which type of network out of the following is formed by connection the computers
of these three buildings?
(a) LAN
(b) MAN
(c) WAN
4. Which wireless channel out of the following should be opted by EPG to connect to
students of all over the world?
(a) Infrared
(b) Microwave
(c) Satellite Delhi 2013
Аnswer:
( i) EPG should install the server in the Faculty Studio Building because it has maximum
20. Workalot consultants are setting up a secured network for their office campus of Gurgaon for
their day-to-day office and Web based activities. They are planning to have connectivity between
3 buildings and the head office situated in Mumbai. Answer the questions (i) to (iv) after going
through the building positions in the campus and other details, which are given below :
1. Suggest the most suitable place (i.e. building) to house the server of this
organisation. Also, give a reason to justify your suggested location.
2. Suggest a cable layout of connections between the buildings inside the campus.
3. Suggest the placement of the following devices with justification :
(a) Switch
(b) Repeater
4. The organisation is planning to provide a high speed link with its head office
situated in the Mumbai using a wired connection. Which of the following cables
will be most suitable for this job?
(a) Optical fibre
(b) Coaxial cable
(c) Ethernet cable Delhi 2012
Аnswer:
( i) Building RED is the suitable place to house the server because it has maximum number of
computers.
( iii) Switches are needed in every building as they help share bandwidth in every building.
Repeaters may be skipped as per above layout (because distance is less than 100 m) however if
building Green and building Red are directly connected, we can place a repeater there as the
distance between these two buildings is more than 100 m.
( iv) Coaxial cable
21. Identify the type of cyber crime for the following situations:
(i) A person complains that Rs. 4.25 lacs have been fraudulently stolen from his/her account
online via some online transactions in two days using NET BANKING.
(ii) A person complaints that his/her debit/credit card is safe with him still some body has done
shopping/ATM transaction on this card.
(iii) A person complaints that somebody has created a fake profile on Facebook and defaming
his/her character with abusive comments and pictures.
(i) Bank Fraud
(ii) Identity Theft
(iii) Cyber Stalking
22. A student has a writing assignment for a history class. Her friend took the class last year. She asks
for and receives a copy of the friend’s paper, which she turns in as her own after making a few
small tweaks.
Borrowed Plagiarism
23. • A transfer student took a similar course at her last school. Instead of creating new work,
she simply turns in papers that she wrote for assignments at her former school.
• A freelance writer is assigned a topic similar to a post on his own blog. He rewords the
article a bit so as not to create duplicate content, then submits it to the client.
Self – plagiarism
24. • You find a paper similar to your assignment and change some wording so that it isn’t a
direct copy, though the ideas, information and/or organization are not original.
• Using work completed by someone else, then reorganizing it or adding extra text to what
was there to start with is also an example of mosaic plagiarism.
Mosaic Plagiarism
25. • A student has a book report due but hasn’t read the book. He visits a book review
website and copies directly from several of the reviews to create “his” report.
• A technical writer copies chunks of wording from documentation that she finds online for
several products similar to the one she is writing about.
Aggregated Plagiarism
26. • You want to write a blog post on a topic that you saw covered on another blog. You like
the way it is organized, so you copy the headings and then fill in with your own text.
• You aren’t sure how to best organize your term paper, so you find a similar one and copy
the table of contents, then follow it exactly when writing your piece.
Outline Plagiarism
27. • A website owner wants to add new content. Instead of writing articles, he copies articles
from other websites and publishes them on his site with his name as the author.
• An academic is expected to publish academic papers but is low on time. He finds a 10-
year-old article in an obscure journal, then copies it and submits it as his own work.
Direct Plagiarism
28. • A student decides to hire an academic writing service to produce a literature review for a
class. The service produces the complete paper and she submits it as her own work.
• A student asks her older brother for help. The brother offers to just write a paper if she
will do his chores for a month. She agrees and turns in what he writes under her byline.
Hired Plagiarism
29. • When someone who did not actually participate in creating a work of writing is listed as
one of the authors, the person is taking authorship credit for someone else’s work.
• When someone’s boss insists on being added as an author to work produced solely by
the employee, what the boss is doing is an example of plagiarism.
Collaboration Plagiarism
30. • If committee members collaborate to create a work of writing, but only the chairperson is
listed as the author, this represents plagiarism. Contributing authors should be credited.
• If you work closely with another person to craft a work of fiction and the other person
actively contributed to the writing, both of you should be listed as authors of the work.
Contributing Author Plagiarism
31. • You have a research paper due tomorrow and don’t want to spend hours on research.
Instead, you find another paper and only use sources listed in that paper’s bibliography.
• An assignment requires five sources. You can only find two online and don’t want to go to
the library. You use only the online sources, but list the others in the bibliography.
Bibliography Plagiarism
32. • Publishing a blog post inspired by another source without including a mention of or link
to that source is an example of secondary source plagiarism.
• If you write a term paper that includes ideas you read about in a journal article, that
journal article should be cited as a source even if you don’t quote directly from it.
Secondary source Plagiarism
33. • A student quotes a large block of text from a book word-for-word in a paper. The student
includes a footnote, but does not indicate in the text that the words are a direct quote.
• You include information that should be attributed to a source as if it were your own idea.
This applies to information you may know from a class, but is not common knowledge.
Accidental Plagiarism
Other References
https://www.cyberralegalservices.com/detail-casestudies.php
https://niiconsulting.com/checkmate/2014/06/it-act-2000-penalties-offences-with-case-studies/
https://www.learncbse.in/important-questions-class-12-computer-science-c-communication-
technologies/